|Responsible Executive:||Finance and Administration|
|Approving Official:||Vice President for Finance and Administration|
|Effective Date:||January 1, 2014|
|Last Revision Date:||Unrevised at this time.|
BOG Regulation 3.0075
Policy 4-OP-F-7 Safeguarding of Confidential Financial and Personal Information
Policy 4-OP-H-6 Use of University Information Technology Resources
Policy 4-OP-H-8 Wireless Data Communications
This section sets forth the policies for using wireless technologies and assigns responsibilities for the deployment of wireless services and the administration of the wireless radio spectrum. This policy describes how wireless technologies are to be deployed, administered and supported at Florida State University (FSU). This document specifically addresses wireless communications and the resolution of interference issues that might arise during use of specific frequencies. The policy couples the desire for campus constituencies to deploy wireless technologies with a central administrative desire to ensure that all constituents be assured of deploying such systems with an acceptable level of service quality and security.
Wireless Ethernet systems and interface cards are deployed at FSU to support both administrative and academic applications. This policy guides such deployments. Policies and guidelines for deployment of these systems are essential to:
- Create a seamless wireless canopy for the use of the entire FSU community. This allows all users to access the network in a consistent manner.
- Prevent interference between different implementations and other uses of the wireless spectrum.
- Safeguard security of campus Network systems.
- Ensure that a baseline level of connection service quality is provided to a diverse user community.
This policy helps define a level of service that the campus community should assume as part of the campus wireless infrastructure.
SCOPE OF THIS POLICY
FSU is responsible for providing a secure and reliable campus Network. Information Technology Services (ITS) shall be responsible for providing services of the scope of this policy. This will be accomplished by the use of campus-wide Network standards and policies and limiting access to data Network connections that do not conform to this document.
This policy governs use of Electronic Communications Resources. Electronic communications is changing rapidly both in terms of technology and application and additional policy questions will surely arise in this area. This policy is to deal with known concerns and therefore does not constitute a comprehensive policy statement, as the technology evolves, so will the policy.
Frequencies: FSU is sole owner of the RF spectrum on campus including the unlicensed frequencies. This prevents interference, safeguards University resources, and ensures service delivery.
Network Reliability: Network reliability is determined by both: the level of user congestion (traffic loads) and service availability (interference and coverage). In efforts to provide an acceptable level of reliability, this policy establishes a method for resolving conflicts that may arise from the use of the wireless spectrum. The campus approaches the shared use of the wireless radio frequencies in the same way that it manages the shared use of the wired Network. ITS will respond to reports of specific devices that are suspected of causing interference and disrupting the campus Network. When interference between the campus Network and other devices cannot be resolved, ITS reserves the right to restrict the use of any or all wireless devices.
Security: The maintenance and the security and integrity of the campus Network requires adequate means of ensuring that only authorized users are able to use the Network. Wireless devices utilizing the campus infrastructure must meet certain standards to ensure only authorized and authenticated users connect to the campus network and that data used by campus users and systems not be exposed to unauthorized viewers. Support: This policy includes the responsibilities of campus units and centralized support organizations for the planning, deployment, management and development of wireless network equipment and services. ITS is responsible for providing service to departments wanting to install any type of data network.
Support: This policy includes the responsibilities of campus units and centralized support organizations for the planning, deployment, management and development of wireless network equipment and services. ITS is responsible for providing service to departments wanting to install any type of data network.
Access Point: Any piece of equipment that allows wireless communication using transmitters and receivers to communicate. These devices act as hubs and allow communications to the campus Network.
Baseline Level of Connection Service Quality: The baseline level of connection service quality is determined by factors that can affect radio transmissions, such as distance from the access point, number of users sharing the bandwidth, state of the environment from which the transmission is taking place, and the presence of other devices that can cause interference. Acceptable throughput levels are determined by the scope of this policy.
Coverage: Coverage is the geographical area where a baseline level of wireless connection service quality is attainable.
Interference: Interference is the degradation of a wireless communication signal caused by electromagnetic radiation from another source. Such interference can either slow down a wireless transmission or completely eliminate it depending on the strength of the signal.
Privacy: Privacy is the condition that is achieved when successfully maintaining the confidentiality of personal, student and/or employee information transmitted over a network.
Security: Security, as used in this policy, not only includes measures to protect electronic communication resources from unauthorized access, but also includes the preservation of resource availability and integrity.
Wireless Infrastructure: Refers to wireless access points, antennas, cabling, power, and Network hardware associated with the deployment of a wireless communications Network.
Responsibility for Wireless Access Points: Campus responsibility for electronic communication resources resides with ITS. ITS must approve installations of wireless access points used on the campus.
Wireless equipment and users must follow general communications policies:
- Wireless services are subject to the same rules and policies that govern other electronic communications services at FSU.
- Abuse or interference with other activities is a violation of acceptable use.
- Interference or disruption of other authorized communications or unauthorized interception of other traffic is a violation of policy.
- Wireless access points must meet all applicable rules of regulatory agencies, such as the:
Federal Communications Commission
Public Utilities Commission
- ITS is the coordinator/custodian of the wireless spectrum at FSU.
- Wireless access points must be installed so as to minimize interference with other RF activities particularly as described below.
- Only hardware and software approved by ITS shall be used for wireless access.
- Deployment and management of wireless access points is the responsibility of ITS.
Department heads are responsible for the installation costs of wireless access points within campus buildings used by the department, following ITS recommendations. Where more than one department share a common building, the Department heads may jointly share responsibility for wireless access points in that building.
Department heads shall obtain prior approval of any deployment of wireless access points from ITS to ensure proper use of the wireless spectrum. Installation of Access Points will be the responsibility of the individual department and must comply with rules and regulations of the University. Installations must not interfere with existing installations and cooperation must be awarded to ensure baseline levels of connection service quality. Installation of antennas must comply with all federal and state regulations for antennas. The installation of access points and bridging devices must be consistent with health, building, and fire codes.
Security: General access to the Network infrastructure, including wireless infrastructure, will be limited to individuals authorized to use campus and Internet resources. Users of campus and Internet resources shall be authenticated using campus central identity management. All connections shall be logged to comply with appropriate state and federal laws.
- Physical Security of wireless access points will be maintained to protect the access point from theft or access to the data port.
- Password and data protection is the responsibility of the application. the wireless infrastructure does not provide specialized encryption or authentication that should be relied on by applications. in particular, no application should rely on IP address based security or reusable clear text passwords. it is expected instead that service machines will expect/require their own general or applications authentication, authorization and encryption mechanisms to be used by clients entering from any unprotected Network.
- Access points or the security gateway shall provide user authentication and/or authorization to the Network before access shall be given.
Interference: Wireless networking equipment is a technology that uses the unlicensed frequency bands to create small local area Network cells. These cells can be further linked together over an underlying wired Network to create an extended wireless network covering whole buildings or wider areas. The success of any wide deployment wireless network requires that all equipment that operates in the frequency spectrum to be carefully installed, configured and monitored to avoid physical and logical interference between components of different Network segments and other equipment. In the event that a wireless device interferes with other equipment, the University shall resolve the interference as determined by this policy and enforced by ITS.
The order of priority for resolving unregulated frequency spectrum use conflicts shall be according to the following priority list:
- Public Access
Suitability: Wireless networks should be viewed as an augmentation to the wired Network to extend the Network for general access to common and transient areas.
- Wireless is appropriate for “common areas” where students, staff, and faculty gather. Common areas most appropriate for wireless use include but not limited to, instructional labs, public areas, and research labs.
- Wireless Network is most applicable for uses such as email and web browsing. Unless using encrypted protocols, wireless devices should not be used for connecting to campus business systems such as human resources, payroll, student information, financial information systems, or other systems that contain sensitive information or are critical to the mission of the University unless a Virtual Private Network (VPN) client is used.
- Wireless access points provide a shared bandwidth. As the number of users increase the available bandwidth per user diminishes.
- New plans for buildings and gathering areas should consider the need for and use of wireless network, similar to the planning done currently for wired Network.
- Users of wireless should consider all unencrypted communications over the Network as insecure and available and all content as clear text.
- Maintaining all wireless Networks and access points on campus.
- Creating, maintaining and updating wireless communications wireless security standards.
- Resolving wireless communication interference problems.
- Managing and deploying wireless communication systems.
- Approving wireless communication hardware and software used by campus departments.
- Approving departmental installations of wireless communication systems/access points when allowed.
- Informing wireless users of security and privacy policies & procedures related to the use of wireless communications in common areas.
- Monitoring performance and security of all wireless Networks within common areas and maintaining Network statistics as required to prevent unauthorized access to the campus Network.
- Monitoring the development of wireless network technologies, evaluating wireless network technology enhancements and, as appropriate, incorporating new wireless network technologies within FSU.
- Adhering to Wireless Communications Policy.
- Registering wireless access point hardware, software, and deployment information for authorization by ITS.
- Informing wireless users of security, privacy policies and procedures related to the use of wireless communications.
- Monitoring performance and security of all departmental equipment to prevent unauthorized access to campus Network.